Critical Vulnerabilities with Public Exploits

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,105 results Clear all
CVE-2020-37080 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
webTareas 2.0.p8 - Privilege Escalation
webTareas 2.0.p8 contains a file deletion vulnerability in the print_layout.php administration component that allows authenticated attackers to delete arbitrary files. Attackers can exploit the vulnerability by manipulating the 'atttmp1' parameter to specify and delete files on the server through an unauthenticated file deletion mechanism.
CWE-73 Feb 03, 2026
CVE-2020-28138 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Online Clothing Store - SQL Injection
SourceCodester Online Clothing Store 1.0 is affected by a SQL Injection via the txtUserName parameter to login.php.
CWE-89 Nov 17, 2020
CVE-2020-37082 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
webERP 4.15.1 - Info Disclosure
webERP 4.15.1 contains an unauthenticated file access vulnerability that allows remote attackers to download database backup files without authentication. Attackers can directly access generated backup files in the companies/weberp/ directory by requesting the Backup_[timestamp].sql.gz file.
CWE-552 Feb 03, 2026
CVE-2020-37090 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
School ERP Pro 1.0 - RCE
School ERP Pro 1.0 contains a file upload vulnerability that allows students to upload arbitrary PHP files to the messaging system. Attackers can upload malicious PHP scripts through the message attachment feature, enabling remote code execution on the server.
CWE-434 Feb 03, 2026
CVE-2020-12429 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Online Course Registration 2.0 - SQL Injection
Online Course Registration 2.0 has multiple SQL injections that would can lead to a complete database compromise and authentication bypass in the login pages: admin/change-password.php, admin/check_availability.php, admin/index.php, change-password.php, check_availability.php, includes/header.php, index.php, and pincode-verification.php.
CWE-89 Apr 28, 2020
CVE-2020-37094 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
EspoCRM 5.8.5 - Auth Bypass
EspoCRM 5.8.5 contains an authentication vulnerability that allows attackers to access other user accounts by manipulating authorization headers. Attackers can decode and modify Basic Authorization and Espo-Authorization tokens to gain unauthorized access to administrative user information and privileges.
CWE-639 Feb 03, 2026
CVE-2020-37120 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Rubo DICOM Viewer 2.0 - Buffer Overflow
Rubo DICOM Viewer 2.0 contains a buffer overflow vulnerability in the DICOM server name input field that allows attackers to overwrite Structured Exception Handler (SEH). Attackers can craft a malicious text file with carefully constructed payload to execute arbitrary code by overwriting SEH and triggering remote code execution.
CWE-121 Feb 05, 2026
CVE-2020-37119 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Nsauditor 3.0.28-3.2.1.0 - RCE
Nsauditor 3.0.28 and 3.2.1.0 contains a buffer overflow vulnerability in the DNS Lookup tool that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious DNS query payload to trigger a three-byte overwrite, bypass ASLR, and execute shellcode through a carefully constructed exploit.
CWE-121 Feb 05, 2026
CVE-2020-5260 9.3 CRITICAL 3 PoCs Analysis EPSS 0.37
Git < 2.17.4 - Insufficiently Protected Credentials
Affected versions of Git have a vulnerability whereby Git can be tricked into sending private credentials to a host controlled by an attacker. Git uses external "credential helper" programs to store and retrieve passwords or other credentials from secure storage provided by the operating system. Specially-crafted URLs that contain an encoded newline can inject unintended values into the credential helper protocol stream, causing the credential helper to retrieve the password for one server (e.g., good.example.com) for an HTTP request being made to another server (e.g., evil.example.com), resulting in credentials for the former being sent to the latter. There are no restrictions on the relationship between the two, meaning that an attacker can craft a URL that will present stored credentials for any host to a host of their choosing. The vulnerability can be triggered by feeding a malicious URL to git clone. However, the affected URLs look rather suspicious; the likely vector would be through systems which automatically clone URLs not visible to the user, such as Git submodules, or package systems built around Git. The problem has been patched in the versions published on April 14th, 2020, going back to v2.17.x. Anyone wishing to backport the change further can do so by applying commit 9a6bbee (the full release includes extra checks for git fsck, but that commit is sufficient to protect clients against the vulnerability). The patched versions are: 2.17.4, 2.18.3, 2.19.4, 2.20.3, 2.21.2, 2.22.3, 2.23.2, 2.24.2, 2.25.3, 2.26.1.
CWE-522 Apr 14, 2020
CVE-2020-37123 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.17
Pinger 1.0 - RCE
Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.
CWE-78 Feb 05, 2026
CVE-2020-37125 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Edimax EW-7438RPn-v3 Mini 1.27 - RCE
Edimax EW-7438RPn-v3 Mini 1.27 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands through the /goform/mp endpoint. Attackers can exploit the vulnerability by sending crafted POST requests with command injection payloads to download and execute malicious scripts on the device.
CWE-78 Feb 05, 2026
CVE-2020-37124 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
B64dec 1.1.2 - Buffer Overflow
B64dec 1.1.2 contains a buffer overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) with crafted input. Attackers can leverage an egg hunter technique and carefully constructed payload to inject and execute malicious code during base64 decoding process.
CWE-121 Feb 05, 2026
CVE-2020-37126 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Free Desktop Clock 3.0 - Buffer Overflow
Free Desktop Clock 3.0 contains a stack overflow vulnerability in the Time Zones display name input that allows attackers to overwrite Structured Exception Handler (SEH) registers. Attackers can exploit the vulnerability by crafting a malicious Unicode input that triggers an access violation and potentially execute arbitrary code.
CWE-121 Feb 05, 2026
CVE-2020-37129 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
Memu Play 7.1.3 - Privilege Escalation
Memu Play 7.1.3 contains an insecure folder permissions vulnerability that allows low-privileged users to modify the MemuService.exe executable. Attackers can replace the service executable with a malicious file during system restart to gain SYSTEM-level privileges by exploiting unrestricted file modification permissions.
CWE-276 Feb 05, 2026
CVE-2020-11455 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Limesurvey < 4.1.11 - Path Traversal
LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php.
CWE-22 Apr 01, 2020
CVE-2020-37138 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
10-Strike Network Inventory Explorer 9.03 - Buffer Overflow
10-Strike Network Inventory Explorer 9.03 contains a buffer overflow vulnerability in the file import functionality that allows remote attackers to execute arbitrary code. Attackers can craft a malicious text file with carefully constructed payload to trigger a stack-based buffer overflow and bypass data execution prevention through a ROP chain.
CWE-121 Feb 05, 2026
CVE-2020-10879 9.8 CRITICAL 1 PoC Analysis EPSS 0.86
rConfig <3.9.5 - Command Injection
rConfig before 3.9.5 allows command injection by sending a crafted GET request to lib/crud/search.crud.php since the nodeId parameter is passed directly to the exec function without being escaped.
CWE-78 Mar 23, 2020
CVE-2020-10230 9.8 CRITICAL 1 PoC Analysis EPSS 0.29
Webpanel - SQL Injection
CentOS-WebPanel.com (aka CWP) CentOS Web Panel (for CentOS 6 and 7) allows SQL Injection via the /cwp_{SESSION_HASH}/admin/loader_ajax.php term parameter.
CWE-89 Mar 16, 2020
CVE-2020-11548 9.8 CRITICAL 1 PoC Analysis EPSS 0.11
Search Meter < 2.13.2 - Remote Code Execution
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CWE-1236 Apr 05, 2020
CVE-2020-15468 9.8 CRITICAL 1 PoC Analysis EPSS 0.01
Persian Vip Download Script - SQL Injection
Persian VIP Download Script 1.0 allows SQL Injection via the cart_edit.php active parameter.
CWE-89 Jul 01, 2020